The engine supports phishing signatures so if detection is added, phishing emails can be detected and blocked. The antispam module should be able to recognize phising emails and mark them as spam.

3. Network Attack Blocker

Click to expand...

The firewall recognizes several types of network attacks which you can configure in the IDS section. Basically it's the primary role of a firewall to block attacks from outside of the network.

4. Behaviour Scan

Click to expand...

Advanced heuristics (AH) is a sophisticated code emulator. Unlike behavior blockers which first allow to run a file and then monitor its behavior and prompt the user for an action if an unusual behavior is detected, AH always runs the code in a virtual environment, checks what actions it does and decides if the actions are suspicious enough to flag the file as potentially malicious.

5. Ability to detect worm, keylogger

Click to expand...

Like any other kind of threats, if these are evaluated by AH as suspicious or recognized by generic / static signatures, they are detected and blocked fine.

6. WiFi protection

Click to expand...

Don't know what you mean exactly. The firewall allows you to choose between strict and "allow sharing" mode. The next version will add support for firewall profiles which can be chosen automatically depending on various criteria, including SSID.

Don't know what you mean exactly. The firewall allows you to choose between strict and "allow sharing" mode. The next version will add support for firewall profiles which can be chosen automatically depending on various criteria, including SSID.